How to share a secret with cheaters
Journal of Cryptology
Coding and information theory
Some improved bounds on the information rate of perfect secret sharing schemes
Journal of Cryptology
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
Handbook of Coding Theory
Secret Sharing Schemes with Nice Access Structures
Fundamenta Informaticae - SPECIAL ISSUE ON TRAJECTORIES OF LANGUAGE THEORY Dedicated to the memory of Alexandru Mateescu
Secret Sharing Schemes with Nice Access Structures
Fundamenta Informaticae - SPECIAL ISSUE ON TRAJECTORIES OF LANGUAGE THEORY Dedicated to the memory of Alexandru Mateescu
Hi-index | 0.00 |
We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The construction is later generalised so the resulting secret sharing is resistant against the Tompa-Woll cheating.